摘要:
An application includes functionality for dynamically modifying controls based on readme documentation content after the development of the application is substantially complete. A developer marks up a documentation file to include references to graphical user interface controls. The application generates a registry that stores associations between the documentation content and the affected controls. The application then modifies the properties of the affected controls to alter presentation or at least one behavior of each affected control. When the application creates an instance of an affected control, the control includes the modified presentation or behavior.
摘要:
Inserting into a document at least one screen image of a computer software application including inserting a macro at a location in the document for the screen image, the macro including instructions for navigating the computer software application to the screen image and for capturing the screen image and executing the macro. In typical embodiments, inserting a macro at a location in the document for the screen image also includes navigating the computer software application to the screen image by a user's operations of user interface controls and capturing the user's operations of user interface controls as instructions for navigating the computer software application to the screen image. Typical embodiments also include executing the macro by navigating the computer software application to the screen image and storing the screen image in computer memory. Executing the macro may include executing the macro for a language in dependence upon regional configuration settings.
摘要:
A technique to facilitate the automatic obtaining or extraction of dialogs or screens such as a graphical user interface from executable program code and saving a snapshot of such dialogs or screens in a graphical format. The executable program code is scanned or searched for particular modules within such program code that are used to generate a user interface or dialogue. Each one of these identified GUI-accessible modules is then processed in order to generate, display, and capture their associated user interface(s) or dialogue(s). Any requisite user input or sample data that is required by these modules is automatically generated and provided to assist in the generation, display, and capture of the interfaces/dialogues.
摘要:
A technique to facilitate the automatic obtaining or extraction of dialogs or screens such as a graphical user interface from executable program code and saving a snapshot of such dialogs or screens in a graphical format. The executable program code is scanned or searched for particular modules within such program code that are used to generate a user interface or dialogue. Each one of these identified GUI-accessible modules is then processed in order to generate, display, and capture their associated user interface(s) or dialogue(s). Any requisite user input or sample data that is required by these modules is automatically generated and provided to assist in the generation, display, and capture of the interfaces/dialogues.
摘要:
A method and implementing computer system are provided for enabling management of restricted parking spaces for vehicles. In an example, a sensing system senses the presence of vehicles in predetermined parking spaces and stores that information for subsequent processing. Particular parking restrictions, or limited parking indicia, for given parking spaces are displayed and viewable to vehicle operators. The posted parking restriction indicia are selectively changeable to accommodate various parking demand situations. The displayed limited parking indicia may be changed from one type of limited parking to other types of limited (or unlimited) parking from a remote server location, either selectively by an administrator or in accordance with a stored parking authorization plan or schedule. Vehicles are scanned for proper authorization for predetermined types of parking spaces. Alarms or other notification processes are implemented to provide notification of unauthorized vehicles which are parked in restricted parking spaces.
摘要:
A method and system for embedding prefetch tags in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.
摘要:
Prefetch tags are embedded in the HTML of a user-requested webpage so that, after delivery of the user-requested webpage to the user, the proxy can cache webpages that the user is likely to request. After the browser issues a request for a webpage to the proxy, the proxy passes the request to the web server. The web server obtains the webpage and embeds prefetch tags into the HTML of the webpage. The selection of prefetch tags is determined by a personalization database or log/statistics database in the web server. The web server sends the user-requested webpage back to the user through the proxy. The proxy reads the prefetch tags and prefetches the webpages identified in the prefetch tags. The webpages identified in the prefetch tags are stored in the proxy cache memory so that they can be quickly sent to the user upon request.
摘要:
The present invention is a method of providing security for a conference call. The invention identifies a conference call participant as opposed to identifying a caller's telephone. The invention allows the host to selectively include or exclude specific conference call participants. The additional security is accomplished through the use of two computer programs: a host program and a caller program. In the host program, each participant selects a personal user ID and passcode. The host then selects the conference call participants from a database and enters any participation restrictions. In the caller program, the callers call into the conference calling center and attempt to access the conference call. The caller is connected to the conference call only if he enters the correct conference call ID and passcode as well as his authorized user ID and passcode. The host may then restrict the participant as indicated in the host program.
摘要:
A method, system, and program for telephony based remote location monitoring are provided. A telephone network receives the caller request to listen only to a remote location telephony device. The telephone network allocates a listen only channel between the caller telephony device and the remote location telephony device. The telephone network activates a microphone at the remote location telephony device via the listen only channel. Then, audio detected at the microphone is streamed via the listen only channel to the caller telephony device, such that the telephone network enables a caller to monitor a remote location through the remote location telephony device with minimized allocation of telephone network resources.
摘要:
The present invention provides a dynamic, easily configurable system, which can be used to encrypt or otherwise hide the internal structure of a network. The present invention protects access to computing systems via a URL by encrypting all or a portion of the URL during the transmission of information over a network. Prior to the actual transmission of the information, fields in the URL can be encrypted using conventional encryption techniques. The encryption will occur after the destination has been determined such that the encryption will not cause the information to be misdirected to a wrong destination. At the destination location, there is first a determination that this URL is an encrypted URL. At this point, a decryption technique is employed based on the predetermined encryption scheme to decrypt the URL. The full URL is now accessed only by the destination location and is not accessible during travel over the network between the originating and destination locations.